Analysis

  • max time kernel
    124s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    21-02-2021 12:30

General

  • Target

    07655ebfac8b7e5b2f1c2e661f6a7c16f3ac97df137d96f4c01e0f225918a149.doc

  • Size

    40KB

  • MD5

    ded1d4636a2ad6ade4665908f8702e65

  • SHA1

    815f94d1103f1ba5fc985de10085b62d8aed3a44

  • SHA256

    07655ebfac8b7e5b2f1c2e661f6a7c16f3ac97df137d96f4c01e0f225918a149

  • SHA512

    7e60167768623d5ddca052e6090089e4e9f93f9e0c970b7c756e816fe8cbb19f3cc4628584a1d1dfff14f0633c0a119edb574718569462e86ec295e30e18256c

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\07655ebfac8b7e5b2f1c2e661f6a7c16f3ac97df137d96f4c01e0f225918a149.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2008

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2008-2-0x00000000722A1000-0x00000000722A4000-memory.dmp
    Filesize

    12KB

  • memory/2008-3-0x000000006FD21000-0x000000006FD23000-memory.dmp
    Filesize

    8KB

  • memory/2008-4-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB